We use cookies to offer you a more personalized and smoother experience.
By visiting this website, you agree to our use of cookies. If you prefer not to accept cookies or require more information, please visit our Privacy Policy.
| CVE | CVE-2025-14304 |
|---|---|
| Title | UEFI Firmware bug prevents IOMMU initialization on certain motherboards |
| Release date | 12/17/2025 |
| Affected Products | Intel 500 / 600 / 700 / 800 series platform |
| Advisory Category | BIOS |
| Severity rating | Medium (CVSS Basic Score: 6.8) |
| Report | SummaryA security vulnerability has been identified on ASRock Group motherboards based on Intel 500, 600, 700, and 800 series platforms. Pre-boot memory protection is not properly activated, which may allow a physically present attacker with a DMA-capable PCIe device to access or modify system memory before the operating system’s security mechanisms are enabled. Details & ImpactDuring the UEFI initialization stage, the platform’s IOMMU was not configured. As a result, a local attacker with physical access and a DMA-capable PCIe device could potentially read or modify system memory during the pre-boot phase, before the OS kernel and its security features are loaded. This condition may expose sensitive data and could allow pre-boot code injection. SolutionUpdate the BIOS firmware to the latest version available for your motherboard, You can find your product through the Support Center or the Motherboards product page. After updating, please refer to ASRock QA “Pre-boot DMA Protection option” to ensure your product’s security. Firmware updates for 600 / 700 / 800 series models have been released. AcknowledgementsThanks to reporter Nick Peterson and Mohamed Al-Sharifi of Riot Games for reporting this issue and working with relevant coordination teams during disclosure. |
ASRock security advisory processes and policies may vary based on circumstances and are subject to change without prior notice. We do not guarantee a response to any particular issue or category of issues. The use of the information in this document or any related links is at your own risk.